Vulnerability Description
The vulnerability is due to insufficient handling of update_file request parameter on update_module.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | U.Motion Builder | < 1.3.4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/156184/Schneider-Electric-U.Motion-Builder-
- https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/Vendor Advisory
- http://packetstormsecurity.com/files/156184/Schneider-Electric-U.Motion-Builder-
- https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/Vendor Advisory
FAQ
What is CVE-2018-7777?
CVE-2018-7777 is a vulnerability with a CVSS score of 8.8 (HIGH). The vulnerability is due to insufficient handling of update_file request parameter on update_module.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A remote, authenticate...
How severe is CVE-2018-7777?
CVE-2018-7777 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7777?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric U.Motion Builder.